ooo
ppp
Static task
static1
Behavioral task
behavioral1
Sample
26f8d01360765711dc1320b10565719f_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
26f8d01360765711dc1320b10565719f_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
26f8d01360765711dc1320b10565719f_JaffaCakes118
Size
27KB
MD5
26f8d01360765711dc1320b10565719f
SHA1
a86ffe3c4346f5c0251e9b6513dd6e48badf970a
SHA256
a4f0a906b1acdd717ef865fcefaf5bb6a097644af7cfb4a0df5a1b74a7ec2b77
SHA512
76b520510020df88d7b02cae599b682c4baf310492622e2cecc25bb35995556a1142e886c69d1ead26478e3fbc1f3bc92cebdb1090028f9b93fdef13ff6a946e
SSDEEP
384:EGMdJGeuwdurrl4HIerfsXoww3KDlNpX+lmd/xYSiyg6ZJg1asCjRw9:VM6BwIqHIerfs4ww3KDV+8haigsJmCjO
Checks for missing Authenticode signature.
resource |
---|
26f8d01360765711dc1320b10565719f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
GetCurrentProcessId
DeleteFileA
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
RaiseException
GetLocalTime
GetPrivateProfileStringA
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
GetTickCount
ExitProcess
VirtualProtectEx
GetLastError
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
CreateProcessA
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
WideCharToMultiByte
GetProcAddress
CallNextHookEx
GetClassNameA
GetWindowThreadProcessId
GetWindowTextA
RegOpenKeyExA
RegCloseKey
_strupr
_stricmp
_strcmpi
__CxxFrameHandler
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
_strlwr
strstr
??3@YAXPAX@Z
strncpy
strchr
ooo
ppp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ